NEWS 26.8 KB
Newer Older
1 2 3
Knot Resolver 4.x.y (2019-0m-dd)
================================

4 5 6 7
Improvements
------------
- DNS-over-HTTPS: answers include `access-control-allow-origin: *` (!823)

8 9 10 11 12
Bugfixes
--------
- TCP to upstream: don't send wrong message length (unlikely, !816)


Tomas Krizek's avatar
Tomas Krizek committed
13
Knot Resolver 4.0.0 (2019-04-18)
14 15
================================

16 17
Incompatible changes
--------------------
Tomas Krizek's avatar
Tomas Krizek committed
18
- see upgrading guide: https://knot-resolver.readthedocs.io/en/stable/upgrading.html
19 20
- configuration: trust_anchors aliases .file, .config() and .negative were removed (!788)
- configuration: trust_anchors.keyfile_default is no longer accessible (!788)
21
- daemon: -k/--keyfile and -K/--keyfile-ro options were removed
22 23 24 25 26
- meson build system is now used for builds (!771)
- build with embedded LMBD is no longer supported
- default modules dir location has changed
- DNSSEC is enabled by default
- upstream packages for Debian now require systemd
Tomas Krizek's avatar
Tomas Krizek committed
27
- libknot >= 2.8 is required
Tomas Krizek's avatar
Tomas Krizek committed
28
- net.list() output format changed (#448)
29
- net.listen() reports error when address-port pair is in use
Tomas Krizek's avatar
Tomas Krizek committed
30 31 32
- bind to DNS-over-TLS port by default (!792)
- stop versioning libkres library
- default port for web management and APIs changed to 8453
33

34 35
Improvements
------------
Tomas Krizek's avatar
Tomas Krizek committed
36
- policy.TLS_FORWARD: if hostname is configured, send it on wire (!762)
37 38 39
- hints module: allow configuring the TTL and change default from 0 to 5s
- policy module: policy.rpz() will watch the file for changes by default
- packaging: lua cqueues added to default dependencies where available
40
- systemd: service is no longer auto-restarted on configuration errors
Tomas Krizek's avatar
Tomas Krizek committed
41 42 43 44 45
- always send DO+CD flags upstream, even in insecure zones (#153)
- cache.stats() output is completely new; see docs (!775)
- improve usability of table_print() (!790, !801)
- add DNS-over-HTTPS support (#280)
- docker image supports and exposes DNS-over-HTTPS
46

47 48 49
Bugfixes
--------
- predict module: load stats module if config didn't specify period (!755)
50 51
- trust_anchors: don't do 5011-style updates on anchors from files
  that were loaded as unmanaged trust anchors (!753)
52
- trust_anchors.add(): include these TAs in .summary() (!753)
53
- policy module: support '#' for separating port numbers, for consistency
54
- fix startup on macOS+BSD when </dev/null and cqueues installed
55
- policy.RPZ: log problems from zone-file level of parser as well (#453)
Tomas Krizek's avatar
Tomas Krizek committed
56
- fix flushing of messages to logs in some cases (notably systemd) (!781)
57
- fix fallback when SERVFAIL or REFUSED is received from upstream (!784)
58
- fix crash when dealing with unknown TA key algorhitm (#449)
59
- go insecure due to algorithm support even if DNSKEY is NODATA (!798)
Tomas Krizek's avatar
Tomas Krizek committed
60
- fix mac addresses in the output of net.interfaces() command (!804)
61
- http module: fix too early renewal of ephemeral certificates (!808)
62

63 64 65
Module API changes
------------------
- kr_straddr_split() changed API a bit (compiler will catch that)
66 67
- C modules defining `*_layer` or `*_props` symbols need to change a bit
  See the upgrading guide for details.  It's detected on module load.
68

69

Petr Špaček's avatar
Petr Špaček committed
70
Knot Resolver 3.2.1 (2019-01-10)
71 72 73 74
================================

Bugfixes
--------
Petr Špaček's avatar
Petr Špaček committed
75 76 77 78
- trust_anchors: respect validity time range during TA bootstrap (!748)
- fix TLS rehandshake handling (!739)
- make TLS_FORWARD compatible with GnuTLS 3.3 (!741)
- special thanks to Grigorii Demidov for his long-term work on Knot Resolver!
79

80 81
Improvements
------------
Petr Špaček's avatar
Petr Špaček committed
82 83 84
- improve handling of timeouted outgoing TCP connections (!734)
- trust_anchors: check syntax of public keys in DNSKEY RRs (!748)
- validator: clarify message about bogus non-authoritative data (!735)
85 86 87
- dnssec validation failures contain more verbose reasoning (!735)
- new function trust_anchors.summary() describes state of DNSSEC TAs (!737),
  and logs new state of trust anchors after start up and automatic changes
88 89
- trust anchors: refuse revoked DNSKEY even if specified explicitly,
  and downgrade missing the SEP bit to a warning
90

91

Petr Špaček's avatar
Petr Špaček committed
92
Knot Resolver 3.2.0 (2018-12-17)
93 94
================================

95 96 97
New features
------------
- module edns_keepalive to implement server side of RFC 7828 (#408)
98
- module nsid to implement server side of RFC 5001 (#289)
Petr Špaček's avatar
Petr Špaček committed
99 100 101 102 103 104 105
- module bogus_log provides .frequent() table (!629, credit Ulrich Wisser)
- module stats collects flags from answer messages (!629, credit Ulrich Wisser)
- module view supports multiple rules with identical address/TSIG specification
  and keeps trying rules until a "non-chain" action is executed (!678)
- module experimental_dot_auth implements an DNS-over-TLS to auth protocol
  (!711, credit Manu Bretelle)
- net.bpf bindings allow advanced users to use eBPF socket filters
106

107 108 109 110
Bugfixes
--------
- http module: only run prometheus in parent process if using --forks=N,
  as the submodule collects metrics from all sub-processes as well.
Petr Špaček's avatar
Petr Špaček committed
111
- TLS fixes for corner cases (!700, !714, !716, !721, !728)
112
- fix build with -DNOVERBOSELOG (#424)
113
- policy.{FORWARD,TLS_FORWARD,STUB}: respect net.ipv{4,6} setting (!710)
114 115
- avoid SERVFAILs due to certain kind of NS dependency cycles, again
  (#374) this time seen as 'circular dependency' in verbose logs
Petr Špaček's avatar
Petr Špaček committed
116
- policy and view modules do not overwrite result finished requests (!678)
117

Tomas Krizek's avatar
Tomas Krizek committed
118 119 120
Improvements
------------
- Dockerfile: rework, basing on Debian instead of Alpine
121 122
- policy.{FORWARD,TLS_FORWARD,STUB}: give advantage to IPv6
  when choosing whom to ask, just as for iteration
123
- use pseudo-randomness from gnutls instead of internal ISAAC (#233)
124
- tune the way we deal with non-responsive servers (!716, !723)
Petr Špaček's avatar
Petr Špaček committed
125 126 127 128 129 130 131 132 133
- documentation clarifies interaction between policy and view modules (!678, !730)

Module API changes
------------------
- new layer is added: answer_finalize
- kr_request keeps ::qsource.packet beyond the begin layer
- kr_request::qsource.tcp renamed to ::qsource.flags.tcp
- kr_request::has_tls renamed to ::qsource.flags.tls
- kr_zonecut_add(), kr_zonecut_del() and kr_nsrep_sort() changed parameters slightly
Tomas Krizek's avatar
Tomas Krizek committed
134

135

Tomas Krizek's avatar
Tomas Krizek committed
136
Knot Resolver 3.1.0 (2018-11-02)
137 138
================================

139 140 141
Incompatible changes
--------------------
- hints.use_nodata(true) by default; that's what most users want
Tomas Krizek's avatar
Tomas Krizek committed
142
- libknot >= 2.7.2 is required
143

144 145 146
Improvements
------------
- cache: handle out-of-space SIGBUS slightly better (#197)
Tomas Krizek's avatar
Tomas Krizek committed
147
- daemon: improve TCP timeout handling (!686)
148

149 150 151
Bugfixes
--------
- cache.clear('name'): fix some edge cases in API (#401)
Tomas Krizek's avatar
Tomas Krizek committed
152
- fix error handling from TLS writes (!669)
153
- avoid SERVFAILs due to certain kind of NS dependency cycles (#374)
154

155

Tomas Krizek's avatar
Tomas Krizek committed
156
Knot Resolver 3.0.0 (2018-08-20)
157 158
================================

159 160
Incompatible changes
--------------------
161 162 163 164 165 166 167
- cache: fail lua operations if cache isn't open yet (!639)
  By default cache is opened *after* reading the configuration,
  and older versions were silently ignoring cache operations.
  Valid configuration must open cache using `cache.open()` or `cache.size =`
  before executing cache operations like `cache.clear()`.
- libknot >= 2.7.1 is required, which brings also larger API changes
- in case you wrote custom Lua modules, please consult
168
  https://knot-resolver.readthedocs.io/en/latest/lib.html#incompatible-changes-since-3-0-0
169 170 171 172 173 174 175 176 177 178 179
- in case you wrote custom C modules, please see compile against
  Knot DNS 2.7 and adjust your module according to messages from C compiler
- DNS cookie module (RFC 7873) is not available in this release,
  it will be later reworked to reflect development in IEFT dnsop working group
- version module was permanently removed because it was not really used by users;
  if you want to receive notifications abou new releases please subscribe to
  https://lists.nic.cz/cgi-bin/mailman/listinfo/knot-resolver-announce

Bugfixes
--------
- fix multi-process race condition in trust anchor maintenance (!643)
180
- ta_sentinel: also consider static trust anchors not managed via RFC 5011
181

182 183 184
Improvements
------------
- reorder_RR() implementation is brought back
185
- bring in performace improvements provided by libknot 2.7
Petr Špaček's avatar
Petr Špaček committed
186 187
- cache.clear() has a new, more powerful API
- cache documentation was improved
188 189
- old name "Knot DNS Resolver" is replaced by unambiguous "Knot Resolver"
  to prevent confusion with "Knot DNS" authoritative server
Petr Špaček's avatar
Petr Špaček committed
190

191

Tomas Krizek's avatar
Tomas Krizek committed
192 193 194 195 196 197 198 199
Knot Resolver 2.4.1 (2018-08-02)
================================

Security
--------
- fix CVE-2018-10920: Improper input validation bug in DNS resolver component
  (security!7, security!9)

200 201
Bugfixes
--------
Tomas Krizek's avatar
Tomas Krizek committed
202
- cache: fix TTL overflow in packet due to min_ttl (#388, security!8)
203
- TLS session resumption: avoid bad scheduling of rotation (#385)
Petr Špaček's avatar
Petr Špaček committed
204
- HTTP module: fix a regression in 2.4.0 which broke custom certs (!632)
205 206
- cache: NSEC3 negative cache even without NS record (#384)
  This fixes lower hit rate in NSEC3 zones (since 2.4.0).
Tomas Krizek's avatar
Tomas Krizek committed
207
- minor TCP and TLS fixes (!623, !624, !626)
208

209

Tomas Krizek's avatar
Tomas Krizek committed
210 211 212
Knot Resolver 2.4.0 (2018-07-03)
================================

213 214
Incompatible changes
--------------------
215
- minimal libknot version is now 2.6.7 to pull in latest fixes (#366)
216

217 218
Security
--------
219
- fix a rare case of zones incorrectly dowgraded to insecure status (!576)
220

221 222 223
New features
------------
- TLS session resumption (RFC 5077), both server and client (!585, #105)
224
  (disabled when compiling with gnutls < 3.5)
225 226 227 228
- TLS_FORWARD policy uses system CA certificate store by default (!568)
- aggressive caching for NSEC3 zones (!600)
- optional protection from DNS Rebinding attack (module rebinding, !608)
- module bogus_log to log DNSSEC bogus queries without verbose logging (!613)
229

230 231
Bugfixes
--------
232
- prefill: fix ability to read certificate bundle (!578)
233
- avoid turning off qname minimization in some cases, e.g. co.uk. (#339)
234
- fix validation of explicit wildcard queries (#274)
235
- dns64 module: more properties from the RFC implemented (incl. bug #375)
236

237 238
Improvements
------------
239
- systemd: multiple enabled kresd instances can now be started using kresd.target
240 241 242 243
- ta_sentinel: switch to version 14 of the RFC draft (!596)
- support for glibc systems with a non-Linux kernel (!588)
- support per-request variables for Lua modules (!533)
- support custom HTTP endpoints for Lua modules (!527)
244

245

Tomas Krizek's avatar
Tomas Krizek committed
246 247 248 249 250 251 252 253 254
Knot Resolver 2.3.0 (2018-04-23)
================================

Security
--------
- fix CVE-2018-1110: denial of service triggered by malformed DNS messages
  (!550, !558, security!2, security!4)
- increase resilience against slow lorris attack (security!5)

255 256 257 258
New features
------------
- new policy.REFUSE to reply REFUSED to clients

259 260
Bugfixes
--------
Tomas Krizek's avatar
Tomas Krizek committed
261 262 263 264 265 266 267 268 269 270 271 272
- validation: fix SERVFAIL in case of CNAME to NXDOMAIN in a single zone (!538)
- validation: fix SERVFAIL for DS . query (!544)
- lib/resolve: don't send unecessary queries to parent zone (!513)
- iterate: fix validation for zones where parent and child share NS (!543)
- TLS: improve error handling and documentation (!536, !555, !559)

Improvements
------------
- prefill: new module to periodically import root zone into cache
  (replacement for RFC 7706, !511)
- network_listen_fd: always create end point for supervisor supplied file descriptor
- use CPPFLAGS build environment variable if set (!547)
273 274


Tomas Krizek's avatar
Tomas Krizek committed
275 276 277 278 279 280 281
Knot Resolver 2.2.0 (2018-03-28)
================================

New features
------------
- cache server unavailability to prevent flooding unreachable servers
  (Please note that caching algorithm needs further optimization
282 283
  and will change in further versions but we need to gather operational
  experience first.)
284

Tomas Krizek's avatar
Tomas Krizek committed
285 286
Bugfixes
--------
287
- don't magically -D_FORTIFY_SOURCE=2 in some cases
Tomas Krizek's avatar
Tomas Krizek committed
288 289 290
- allow large responses for outbound over TCP
- fix crash with RR sets with over 255 records

291

Tomas Krizek's avatar
Tomas Krizek committed
292
Knot Resolver 2.1.1 (2018-02-23)
293 294 295 296 297 298
================================

Bugfixes
--------
- when iterating, avoid unnecessary queries for NS in insecure parent.
  This problem worsened in 2.0.0. (#246)
Tomas Krizek's avatar
Tomas Krizek committed
299
- prevent UDP packet leaks when using TLS forwarding
300
- fix the hints module also on some other systems, e.g. Gentoo.
301 302


Tomas Krizek's avatar
Tomas Krizek committed
303
Knot Resolver 2.1.0 (2018-02-16)
304
================================
305

306 307
Incompatible changes
--------------------
308
- stats: remove tracking of expiring records (predict uses another way)
Tomas Krizek's avatar
Tomas Krizek committed
309
- systemd: re-use a single kresd.socket and kresd-tls.socket
310 311
- ta_sentinel: implement protocol draft-ietf-dnsop-kskroll-sentinel-01
  (our draft-ietf-dnsop-kskroll-sentinel-00 implementation had inverted logic)
312
- libknot: require version 2.6.4 or newer to get bugfixes for DNS-over-TLS
313

314 315
Bugfixes
--------
316
- detect_time_jump module: don't clear cache on suspend-resume (#284)
317
- stats module: fix stats.list() returning nothing, regressed in 2.0.0
318
- policy.TLS_FORWARD: refusal when configuring with multiple IPs (#306)
319
- cache: fix broken refresh of insecure records that were about to expire
320 321
- fix the hints module on some systems, e.g. Fedora (came back on 2.0.0)
- build with older gnutls (conditionally disable features)
322
- fix the predict module to work with insecure records & cleanup code
323 324


Vladimír Čunát's avatar
Vladimír Čunát committed
325 326 327 328 329 330 331
Knot Resolver 2.0.0 (2018-01-31)
================================

Incompatible changes
--------------------
- systemd: change unit files to allow running multiple instances,
  deployments with single instance now must use `kresd@1.service`
332
  instead of `kresd.service`; see kresd.systemd(7) for details
Vladimír Čunát's avatar
Vladimír Čunát committed
333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361
- systemd: the directory for cache is now /var/cache/knot-resolver
- unify default directory and user to `knot-resolver`
- directory with trust anchor file specified by -k option must be writeable
- policy module is now loaded by default to enforce RFC 6761;
  see documentation for policy.PASS if you use locally-served DNS zones
- drop support for alternative cache backends memcached, redis,
  and for Lua bindings for some specific cache operations
- REORDER_RR option is not implemented (temporarily)

New features
------------
- aggressive caching of validated records (RFC 8198) for NSEC zones;
  thanks to ICANN for sponsoring this work.
- forwarding over TLS, authenticated by SPKI pin or certificate.
  policy.TLS_FORWARD pipelines queries out-of-order over shared TLS connection
  Beware: Some resolvers do not support out-of-order query processing.
  TLS forwarding to such resolvers will lead to slower resolution or failures.
- trust anchors: you may specify a read-only file via -K or --keyfile-ro
- trust anchors: at build-time you may set KEYFILE_DEFAULT (read-only)
- ta_sentinel module implements draft ietf-dnsop-kskroll-sentinel-00,
  enabled by default
- serve_stale module is prototype, subject to change
- extended API for Lua modules

Bugfixes
--------
- fix build on osx - regressed in 1.5.3 (different linker option name)


Vladimír Čunát's avatar
Vladimír Čunát committed
362 363 364 365 366 367 368 369 370 371
Knot Resolver 1.5.3 (2018-01-23)
================================

Bugfixes
--------
- fix the hints module on some systems, e.g. Fedora.
  Symptom: `undefined symbol: engine_hint_root_file`


Knot Resolver 1.5.2 (2018-01-22)
372 373 374 375 376 377 378 379 380 381 382 383 384 385
================================

Security
--------
- fix CVE-2018-1000002: insufficient DNSSEC validation, allowing
  attackers to deny existence of some data by forging packets.
  Some combinations pointed out in RFC 6840 sections 4.1 and 4.3
  were not taken into account.

Bugfixes
--------
- memcached: fix fallout from module rename in 1.5.1


386
Knot Resolver 1.5.1 (2017-12-12)
387
================================
388

389 390 391
Incompatible changes
--------------------
- script supervisor.py was removed, please migrate to a real process manager
392
- module ketcd was renamed to etcd for consistency
393
- module kmemcached was renamed to memcached for consistency
394

395 396
Bugfixes
--------
397
- fix SIGPIPE crashes (#271)
398
- tests: work around out-of-space for platforms with larger memory pages
399 400
- lua: fix mistakes in bindings affecting 1.4.0 and 1.5.0 (and 1.99.1-alpha),
  potentially causing problems in dns64 and workarounds modules
401 402 403 404 405 406 407
- predict module: various fixes (!399)

Improvements
------------
- add priming module to implement RFC 8109, enabled by default (#220)
- add modules helping with system time problems, enabled by default;
  for details see documentation of detect_time_skew and detect_time_jump
408 409


Vladimír Čunát's avatar
Vladimír Čunát committed
410
Knot Resolver 1.5.0 (2017-11-02)
411 412 413 414 415 416
================================

Bugfixes
--------
- fix loading modules on Darwin

417 418 419
Improvements
------------
- new module ta_signal_query supporting Signaling Trust Anchor Knowledge
Vladimír Čunát's avatar
Vladimír Čunát committed
420
  using Keytag Query (RFC 8145 section 5); it is enabled by default
Vladimír Čunát's avatar
Vladimír Čunát committed
421 422
- attempt validation for more records but require it for fewer of them
  (e.g. avoids SERVFAIL when server adds extra records but omits RRSIGs)
423

424

425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447
Knot Resolver 1.99.1-alpha (2017-10-26)
=======================================
This is an experimental release meant for testing aggressive caching.
It contains some regressions and might (theoretically) be even vulnerable.
The current focus is to minimize queries into the root zone.

Improvements
------------
- negative answers from validated NSEC (NXDOMAIN, NODATA)
- verbose log is very chatty around cache operations (maybe too much)

Regressions
-----------
- dropped support for alternative cache backends
  and for some specific cache operations
- caching doesn't yet work for various cases:
    * negative answers without NSEC (i.e. with NSEC3 or insecure)
	* +cd queries (needs other internal changes)
	* positive wildcard answers
- spurious SERVFAIL on specific combinations of cached records, printing:
	<= bad keys, broken trust chain
- make check
- a few Deckard tests are broken, probably due to some problems above
448
- also unknown ones?
449 450 451



452
Knot Resolver 1.4.0 (2017-09-22)
453 454 455 456 457
================================

Incompatible changes
--------------------
- lua: query flag-sets are no longer represented as plain integers.
458 459 460
  kres.query.* no longer works, and kr_query_t lost trivial methods
  'hasflag' and 'resolved'.
  You can instead write code like qry.flags.NO_0X20 = true.
461

462 463 464
Bugfixes
--------
- fix exiting one of multiple forks (#150)
465 466
- cache: change the way of using LMDB transactions.  That in particular
  fixes some cases of using too much space with multiple kresd forks (#240).
467

468 469 470
Improvements
------------
- policy.suffix: update the aho-corasick code (#200)
471 472
- root hints are now loaded from a zonefile; exposed as hints.root_file().
  You can override the path by defining ROOTHINTS during compilation.
473
- policy.FORWARD: work around resolvers adding unsigned NS records (#248)
474
- reduce unneeded records previously put into authority in wildcarded answers
475 476


Vladimír Čunát's avatar
Vladimír Čunát committed
477
Knot Resolver 1.3.3 (2017-08-09)
478 479
================================

Vladimír Čunát's avatar
Vladimír Čunát committed
480 481 482 483 484 485
Security
--------
- Fix a critical DNSSEC flaw.  Signatures might be accepted as valid
  even if the signed data was not in bailiwick of the DNSKEY used to
  sign it, assuming the trust chain to that DNSKEY was valid.

486 487 488
Bugfixes
--------
- iterate: skip RRSIGs with bad label count instead of immediate SERVFAIL
489
- utils: fix possible incorrect seeding of the random generator
490
- modules/http: fix compatibility with the Prometheus text format
491

492 493 494 495 496 497
Improvements
------------
- policy: implement remaining special-use domain names from RFC6761 (#205),
  and make these rules apply only if no other non-chain rule applies


Vladimír Čunát's avatar
Vladimír Čunát committed
498
Knot Resolver 1.3.2 (2017-07-28)
499 500
================================

501 502 503 504 505
Security
--------
- fix possible opportunities to use insecure data from cache as keys
  for validation

506 507 508
Bugfixes
--------
- daemon: check existence of config file even if rundir isn't specified
509
- policy.FORWARD and STUB: use RTT tracking to choose servers (#125, #208)
510
- dns64: fix CNAME problems (#203)  It still won't work with policy.STUB.
Vladimír Čunát's avatar
Vladimír Čunát committed
511
- hints: better interpretation of hosts-like files (#204)
512
         also, error out if a bad entry is encountered in the file
513
- dnssec: handle unknown DNSKEY/DS algorithms (#210)
Vladimír Čunát's avatar
Vladimír Čunát committed
514
- predict: fix the module, broken since 1.2.0 (#154)
515

516 517 518 519
Improvements
------------
- embedded LMDB fallback: update 0.9.18 -> 0.9.21

520

Vladimír Čunát's avatar
Vladimír Čunát committed
521
Knot Resolver 1.3.1 (2017-06-23)
522 523 524 525 526
================================

Bugfixes
--------
- modules/http: fix finding the static files (bug from 1.3.0)
527
- policy.FORWARD: fix some cases of CNAMEs obstructing search for zone cuts
528 529


530
Knot Resolver 1.3.0 (2017-06-13)
531 532 533 534 535 536 537 538 539
================================

Security
--------
- Refactor handling of AD flag and security status of resource records.
  In some cases it was possible for secure domains to get cached as
  insecure, even for a TLD, leading to disabled validation.
  It also fixes answering with non-authoritative data about nameservers.

540 541
Improvements
------------
542 543
- major feature: support for forwarding with validation (#112).
  The old policy.FORWARD action now does that; the previous non-validating
544
  mode is still available as policy.STUB except that also uses caching (#122).
545
- command line: specify ports via @ but still support # for compatibility
546
- policy: recognize 100.64.0.0/10 as local addresses
547 548
- layer/iterate: *do* retry repeatedly if REFUSED, as we can't yet easily
  retry with other NSs while avoiding retrying with those who REFUSED
549 550
- modules: allow changing the directory where modules are found,
  and do not search the default library path anymore.
551

552 553 554
Bugfixes
--------
- validate: fix insufficient caching for some cases (relatively rare)
555 556
- avoid putting "duplicate" record-sets into the answer (#198)

557

558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578
Knot Resolver 1.2.6 (2017-04-24)
================================

Security
--------
- dnssec: don't set AD flag for NODATA answers if wildcard non-existence
  is not guaranteed due to opt-out in NSEC3

Improvements
------------
- layer/iterate: don't retry repeatedly if REFUSED

Bugfixes
--------
- lib/nsrep: revert some changes to NS reputation tracking that caused
  severe problems to some users of 1.2.5 (#178 and #179)
- dnssec: fix verification of wildcarded non-singleton RRsets
- dnssec: allow wildcards located directly under the root
- layer/rrcache: avoid putting answer records into queries in some cases


579
Knot Resolver 1.2.5 (2017-04-05)
Ondřej Surý's avatar
Ondřej Surý committed
580 581 582 583 584 585 586 587 588 589 590 591 592 593 594
================================

Security
--------
- layer/validate: clear AD if closest encloser proof has opt-outed
  NSEC3 (#169)
- layer/validate: check if NSEC3 records in wildcard expansion proof
  has an opt-out
- dnssec/nsec: missed wildcard no-data answers validation has been
  implemented

Improvements
------------
- modules/dnstap: a DNSTAP support module
  (Contributed by Vicky Shrestha)
595
- modules/workarounds: a module adding workarounds for known
Ondřej Surý's avatar
Ondřej Surý committed
596 597
  DNS protocol violators
- layer/iterate: fix logging of glue addresses
598 599
- kr_bitcmp: allow bits=0 and consequently 0.0.0.0/0 matches in view
  and renumber modules.
Ondřej Surý's avatar
Ondřej Surý committed
600 601
- modules/padding: Improve default padding of responses
  (Contributed by Daniel Kahn Gillmor)
Ondřej Surý's avatar
Ondřej Surý committed
602
- New kresc client utility (experimental; don't rely on the API yet)
Ondřej Surý's avatar
Ondřej Surý committed
603 604 605 606 607 608 609 610 611

Bugfixes
--------
- trust anchors: Improve trust anchors storage format (#167)
- trust anchors: support non-root TAs, one domain per file
- policy.DENY: set AA flag and clear AD flag
- lib/resolve: avoid unnecessary DS queries
- lib/nsrep: don't treat servers with NOIP4 + NOIP6 flags as timeouted
- layer/iterate: During packet classification (answer vs. referral)
612
  don't analyze AUTHORITY section in authoritative answer if ANSWER
Ondřej Surý's avatar
Ondřej Surý committed
613 614
  section contains records that have been requested

615

Ondřej Surý's avatar
Ondřej Surý committed
616
Knot Resolver 1.2.4 (2017-03-09)
Ondřej Surý's avatar
Ondřej Surý committed
617 618
================================

Ondřej Surý's avatar
Ondřej Surý committed
619 620
Security
--------
Ondřej Surý's avatar
Ondřej Surý committed
621
- Knot Resolver 1.2.0 and higher could return AD flag for insecure
Ondřej Surý's avatar
Ondřej Surý committed
622 623
  answer if the daemon received answer with invalid RRSIG several
  times in a row.
Ondřej Surý's avatar
Ondřej Surý committed
624

Ondřej Surý's avatar
Ondřej Surý committed
625 626
Improvements
------------
Ondřej Surý's avatar
Ondřej Surý committed
627 628
- modules/policy: allow QTRACE policy to be chained with other
  policies
Ondřej Surý's avatar
Ondřej Surý committed
629 630 631 632
- hints.add_hosts(path): a new property
- module: document the API and simplify the code
- policy.MIRROR: support IPv6 link-local addresses
- policy.FORWARD: support IPv6 link-local addresses
Ondřej Surý's avatar
Ondřej Surý committed
633 634
- add net.outgoing_{v4,v6} to allow specifying address to use for
  connections
Ondřej Surý's avatar
Ondřej Surý committed
635 636 637 638

Bugfixes
--------
- layer/iterate: some improvements in cname chain unrolling
Ondřej Surý's avatar
Ondřej Surý committed
639 640
- layer/validate: fix duplicate records in AUTHORITY section in case
  of WC expansion proof
Ondřej Surý's avatar
Ondřej Surý committed
641
- lua: do *not* truncate cache size to unsigned
642 643
- forwarding mode: correctly forward +cd flag
- fix a potential memory leak
Ondřej Surý's avatar
Ondřej Surý committed
644 645
- don't treat answers that contain DS non-existance proof as insecure
- don't store NSEC3 and their signatures in the cache
Ondřej Surý's avatar
Ondřej Surý committed
646 647
- layer/iterate: when processing delegations, check if qname is at or
  below new authority
Ondřej Surý's avatar
Ondřej Surý committed
648 649


Ondřej Surý's avatar
Ondřej Surý committed
650 651 652 653 654 655 656 657 658 659 660
Knot Resolver 1.2.3 (2017-02-23)
================================

Bugfixes
--------
- Disable storing GLUE records into the cache even in the
  (non-default) QUERY_PERMISSIVE mode
- iterate: skip answer RRs that don't match the query
- layer/iterate: some additional processing for referrals
- lib/resolve: zonecut fetching error was fixed

Ondřej Surý's avatar
Ondřej Surý committed
661

Ondřej Surý's avatar
Ondřej Surý committed
662 663 664 665 666 667 668 669 670 671
Knot Resolver 1.2.2 (2017-02-10)
================================

Bugfixes:
---------
- Fix -k argument processing to avoid out-of-bounds memory accesses
- lib/resolve: fix zonecut fetching for explicit DS queries
- hints: more NULL checks
- Fix TA bootstrapping for multiple TAs in the IANA XML file

Ondřej Surý's avatar
Ondřej Surý committed
672 673 674 675
Testing:
--------
- Update tests to run tests with and without QNAME minimization

Ondřej Surý's avatar
Ondřej Surý committed
676

Vladimír Čunát's avatar
Vladimír Čunát committed
677 678 679 680 681 682 683 684 685
Knot Resolver 1.2.1 (2017-02-01)
====================================

Security:
---------
- Under certain conditions, a cached negative answer from a CD query
  would be reused to construct response for non-CD queries, resulting
  in Insecure status instead of Bogus.  Only 1.2.0 release was affected.

Ondřej Surý's avatar
Ondřej Surý committed
686 687 688 689 690 691 692 693 694
Documentation
-------------
- Update the typo in the documentation: The query trace policy is
  named policy.QTRACE (and not policy.TRACE)

Bugfixes:
---------
- lua: make the map command check its arguments

Ondřej Surý's avatar
Ondřej Surý committed
695

Ondřej Surý's avatar
Ondřej Surý committed
696
Knot Resolver 1.2.0 (2017-01-24)
697
====================================
698 699 700

Security:
---------
701 702
- In a policy.FORWARD() mode, the AD flag was being always set by mistake.
  It is now cleared, as the policy.FORWARD() doesn't do DNSSEC validation yet.
703

704 705 706 707
Improvements:
-------------
- The DNSSEC Validation has been refactored, fixing many resolving
  failures.
708 709 710
- Add module `version` that checks for updates and CVEs periodically.
- Support RFC7830: EDNS(0) padding in responses over TLS.
- Support CD flag on incoming requests.
711 712
- hints module: previously /etc/hosts was loaded by default, but not anymore.
  Users can now actually avoid loading any file.
713 714 715
- DNS over TLS now creates ephemeral certs.
- Configurable cache.{min,max}_tll option, with max_ttl defaulting to 6 days.
- Option to reorder RRs in the response.
Ondřej Surý's avatar
Ondřej Surý committed
716
- New policy.QTRACE policy to print packet contents
717 718 719 720 721 722

Bugfixes:
---------
- Trust Anchor configuration is now more robust.
- Correctly answer NOTIMPL for meta-types and non-IN RR classes.
- Free TCP buffer on cancelled connection.
723
- Fix crash in hints module on empty hints file, and fix non-lowercase hints.
724

725 726
Miscellaneous:
--------------
727 728
- It now requires knot >= 2.3.1 to link successfully.
- The API+ABI for modules changed slightly.
729
- New LRU implementation.
730

731

732 733 734 735 736 737 738 739
Knot Resolver 1.1.1 (2016-08-24)
================================

Bugfixes:
---------
 - Fix 0x20 randomization with retransmit
 - Fix pass-through for the stub mode
 - Fix the root hints IPv6 addresses
Ondřej Surý's avatar
Ondřej Surý committed
740
 - Fix dst addr for retries over TCP
741 742 743 744 745 746 747 748

Improvements:
-------------
 - Track RTT of all tried servers for faster retransmit
 - DAF: Allow forwarding to custom port
 - systemd: Read EnvironmentFile and user $KRESD_ARGS
 - systemd: Update systemd units to be named after daemon

749

750 751 752
Knot Resolver 1.1.0 (2016-08-12)
================================

753 754 755 756 757 758 759 760 761 762 763
Improvements:
-------------
 - RFC7873 DNS Cookies
 - RFC7858 DNS over TLS
 - HTTP/2 web interface, RESTful API
 - Metrics exported in Prometheus
 - DNS firewall module
 - Explicit CNAME target fetching in strict mode
 - Query minimisation improvements
 - Improved integration with systemd

764 765 766 767

Knot Resolver 1.0.0 (2016-05-30)
================================

768 769 770
Initial release:
----------------
 - The first initial release